Update module golang.org/x/crypto to v0.45.0 [SECURITY]#756
Update module golang.org/x/crypto to v0.45.0 [SECURITY]#756renovate[bot] merged 1 commit intomasterfrom
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #756 +/- ##
==========================================
- Coverage 82.23% 82.20% -0.04%
==========================================
Files 111 111
Lines 6489 6489
==========================================
- Hits 5336 5334 -2
- Misses 757 758 +1
- Partials 396 397 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
We are not using the SSH package provided by the crypto library, so we are not affected by these vulnerabilities. This also requires us to upgrade the minimum go version to 1.24.0, which we are not doing yet. |
48b603e to
1fa7fd2
Compare
aa9fb66 to
fbbeef6
Compare
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
f550ffc to
767d4bd
Compare
44303d8 to
f371b0e
Compare
2af41c6 to
a5198b0
Compare
8680ef7 to
048e794
Compare
6269fd1 to
44f1570
Compare
ff7b410 to
21bdb1e
Compare
Generated by renovateBot
21bdb1e to
f2fd146
Compare
This PR contains the following updates:
v0.32.0→v0.45.0GitHub Vulnerability Alerts
CVE-2025-22869
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
CVE-2025-58181
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47914
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.